1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
15

How many bits are necessary for a binary representation (unsigned) of:

Computers and Technology
1 answer:
pshichka [43]3 years ago
4 0

Answer:

Hi!

The answer to:

a. 6 bits.

b. 9 bits.

c. 26 bits.

Explanation:

a. For the states of the U.S.A, you need 50 or more combinations to represents each element.

<u>If you use 6 bits, the possible combinations are 2⁶ = 64.  </u>

b. For days in a year, you need 365 or more combinations to represents each element.

<u>If you use 9 bits, the possible combinations are 2⁹ = 512. </u>

c. For inhabitants of California, you need 36,457,549 or more combinations to represents each element.

<u>If you use 26 bits, the possible combinations are 2²⁶ = 67,108,864.</u> If you use 25 bits instead of 26, then you have 2²⁵ = 33,554,432 combinations. These possible combinations are not enough to represent each inhabitant.

You might be interested in
Clickable text or image that takes you to a different site
hichkok12 [17]
A clickable text or image that takes you to a different site is called a Hyperlink or simply a Link.
3 0
2 years ago
security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
daser333 [38]

Organization must notify the DPA and individuals

<h3>What was the typical weakness that outside attackers exploited?</h3>

One frequent flaw in network security that some attackers have learnt to take advantage of is the propensity of some web browsers, like Safari, to launch "safe" or "trusted" scripts automatically. Threat detection is the process of scrutinizing a security ecosystem from top to bottom to find any malicious behavior that could jeopardize the network. If a threat is identified, mitigating measures must be taken to effectively neutralize it before it can take advantage of any existing vulnerabilities. It's critical to often scan because security professionals and hackers frequently discover new vulnerabilities, like Log4Shell. Therefore, scanning for and identifying security vulnerabilities is the initial step in the vulnerability remedy procedure.

To learn more about outside attackers refer to

brainly.com/question/17329931

#SPJ4

3 0
11 months ago
What is the main idea of this article? Please someone help me. I will give brainliest answer
mart [117]
The main idea of this article is that theme parks are conducting scientific research that is benefiting the community. Hope this helps!
8 0
3 years ago
What command launches the remote desktop client for windows?
Ksju [112]
%windir%\system32\mstsc.exe

launches the RDP client.
7 0
3 years ago
Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
algol13

Answer:

It will be average (B2:C2)

as it will select all the data between B2 and C2

7 0
2 years ago
Read 2 more answers
Other questions:
  • What is the function of the modem?
    12·2 answers
  • True or false?
    5·1 answer
  • What is a good way to minimize technical problems with your computer
    10·1 answer
  • Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
    14·1 answer
  • do you think that some people have difficulty talking to others face to face because of how prevalent texting is today
    15·2 answers
  • For a parking application that lets you pay for parking via your phone, which of these is an example of a functional requirement
    8·1 answer
  • Why When I change my pfp It be blurry and it be ugly- if you know what I mean :c
    15·2 answers
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
  • 10.
    15·1 answer
  • Given an array of integers a, your task is to calculate the digits that occur the most number of times in the array. Return the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!